First published: Sun May 02 2021(Updated: )
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | >=1.0.0<1.10.15 | |
Apache Airflow | >=2.0.0<2.0.2 | |
pip/apache-airflow | >=2.0.0a1<2.0.2 | 2.0.2 |
pip/apache-airflow | <1.10.15 | 1.10.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28359 is a vulnerability in Apache Airflow that allows for XSS exploits through the 'origin' parameter passed to endpoints like '/trigger'.
CVE-2021-28359 affects Apache Airflow versions <1.10.15 in the 1.x series and versions 2.0.0, 2.0.1, and 2.x series.
CVE-2021-28359 has a severity rating of 6.1 (medium).
CVE-2021-28359 can be exploited through an XSS (Cross-Site Scripting) attack by manipulating the 'origin' parameter in certain endpoints like '/trigger'.
Yes, you can mitigate CVE-2021-28359 by updating Apache Airflow to version 1.10.15 for the 1.x series or version 2.0.2 for the 2.x series.